Year |
Citation |
Score |
2021 |
Wang W, Tamaki K, Curty M. Measurement-device-independent quantum key distribution with leaky sources. Scientific Reports. 11: 1678. PMID 33462254 DOI: 10.1038/s41598-021-81003-2 |
0.825 |
|
2020 |
González-Payo J, Trényi R, Wang W, Curty M. Upper Security Bounds for Coherent-One-Way Quantum Key Distribution. Physical Review Letters. 125: 260510. PMID 33449754 DOI: 10.1103/PhysRevLett.125.260510 |
0.614 |
|
2020 |
Pereira M, Kato G, Mizutani A, Curty M, Tamaki K. Quantum key distribution with correlated sources. Science Advances. 6. PMID 32917693 DOI: 10.1126/Sciadv.Aaz4487 |
0.801 |
|
2019 |
Zapatero V, Curty M. Long-distance device-independent quantum key distribution. Scientific Reports. 9: 17749. PMID 31780691 DOI: 10.1038/S41598-019-53803-0 |
0.658 |
|
2019 |
Zhong X, Hu J, Curty M, Qian L, Lo HK. Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. Physical Review Letters. 123: 100506. PMID 31573297 DOI: 10.1103/Physrevlett.123.100506 |
0.787 |
|
2019 |
Huang A, Navarrete Á, Sun S, Chaiwongkhot P, Curty M, Makarov V. Laser-seeding Attack in Quantum Key Distribution Physical Review Applied. 12. DOI: 10.1103/Physrevapplied.12.064043 |
0.665 |
|
2019 |
Trényi R, Azuma K, Curty M. Beating the repeaterless bound with adaptive measurement-device-independent quantum key distribution New Journal of Physics. 21: 113052. DOI: 10.1088/1367-2630/Ab54Aa |
0.608 |
|
2019 |
Grasselli F, Navarrete Á, Curty M. Asymmetric twin-field quantum key distribution New Journal of Physics. 21: 113032. DOI: 10.1088/1367-2630/Ab520E |
0.611 |
|
2019 |
Grasselli F, Curty M. Practical decoy-state method for twin-field quantum key distribution New Journal of Physics. 21: 073001. DOI: 10.1088/1367-2630/Ab2B00 |
0.656 |
|
2019 |
Pereira M, Curty M, Tamaki K. Quantum key distribution with flawed and leaky sources Npj Quantum Information. 5. DOI: 10.1038/S41534-019-0180-9 |
0.816 |
|
2019 |
Curty M, Azuma K, Lo H. Simple security proof of twin-field type quantum key distribution protocol Npj Quantum Information. 5. DOI: 10.1038/S41534-019-0175-6 |
0.632 |
|
2019 |
Curty M, Lo H. Foiling covert channels and malicious classical post-processing units in quantum key distribution Npj Quantum Information. 5. DOI: 10.1038/S41534-019-0131-5 |
0.789 |
|
2019 |
Mizutani A, Kato G, Azuma K, Curty M, Ikuta R, Yamamoto T, Imoto N, Lo H, Tamaki K. Quantum key distribution with setting-choice-independently correlated light sources Npj Quantum Information. 5. DOI: 10.1038/S41534-018-0122-Y |
0.851 |
|
2018 |
Rusca D, Boaron A, Curty M, Martin A, Zbinden H. Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol Physical Review A. 98. DOI: 10.1103/Physreva.98.052336 |
0.672 |
|
2018 |
Li C, Curty M, Xu F, Bedroya O, Lo H. Secure quantum communication in the presence of phase- and polarization-dependent loss Physical Review A. 98. DOI: 10.1103/Physreva.98.042324 |
0.828 |
|
2018 |
Wang W, Tamaki K, Curty M. Finite-key security analysis for quantum key distribution with leaky sources New Journal of Physics. 20: 083027. DOI: 10.1088/1367-2630/Aad839 |
0.807 |
|
2018 |
Navarrete Á, Wang W, Xu F, Curty M. Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors New Journal of Physics. 20: 043018. DOI: 10.1088/1367-2630/Aab746 |
0.795 |
|
2017 |
Roberts GL, Lucamarini M, Yuan ZL, Dynes JF, Comandar LC, Sharpe AW, Shields AJ, Curty M, Puthoor IV, Andersson E. Experimental measurement-device-independent quantum digital signatures. Nature Communications. 8: 1098. PMID 29061966 DOI: 10.1038/S41467-017-01245-5 |
0.622 |
|
2017 |
Yin H, Wang W, Tang Y, Zhao Q, Liu H, Sun X, Zhang W, Li H, Puthoor IV, You L, Andersson E, Wang Z, Liu Y, Jiang X, Ma X, ... ... Curty M, et al. Experimental measurement-device-independent quantum digital signatures over a metropolitan network Physical Review A. 95. DOI: 10.1103/Physreva.95.042338 |
0.799 |
|
2017 |
Tamaki K, Lo H, Mizutani A, Kato G, Lim CCW, Azuma K, Curty M. Security of quantum key distribution with iterative sifting Quantum Science and Technology. 3: 014002. DOI: 10.1088/2058-9565/aa89bd |
0.627 |
|
2016 |
Sajeed S, Huang A, Sun S, Xu F, Makarov V, Curty M. Insecurity of Detector-Device-Independent Quantum Key Distribution. Physical Review Letters. 117: 250505. PMID 28036200 DOI: 10.1103/Physrevlett.117.250505 |
0.824 |
|
2016 |
Puthoor IV, Amiri R, Wallden P, Curty M, Andersson E. Measurement-device-independent quantum digital signatures Physical Review A. 94. DOI: 10.1103/Physreva.94.022328 |
0.719 |
|
2016 |
Tamaki K, Curty M, Lucamarini M. Decoy-state quantum key distribution with a leaky source New Journal of Physics. 18: 065008. DOI: 10.1088/1367-2630/18/6/065008 |
0.826 |
|
2015 |
Curty M, Jofre M, Pruneri V, Mitchell MW. Passive decoy-state quantum key distribution with coherent light Entropy. 17: 4064-4082. DOI: 10.3390/E17064064 |
0.598 |
|
2015 |
Xu F, Curty M, Qi B, Lo HK. Measurement-device-independent quantum cryptography Ieee Journal On Selected Topics in Quantum Electronics. 21. DOI: 10.1109/Jstqe.2014.2381460 |
0.854 |
|
2015 |
González P, Rebón L, Ferreira da Silva T, Figueroa M, Saavedra C, Curty M, Lima G, Xavier GB, Nogueira WAT. Quantum key distribution with untrusted detectors Physical Review a - Atomic, Molecular, and Optical Physics. 92. DOI: 10.1103/PhysRevA.92.022337 |
0.57 |
|
2015 |
Mizutani A, Curty M, Lim CCW, Imoto N, Tamaki K. Finite-key security analysis of quantum key distribution with imperfect light sources New Journal of Physics. 17: 093011. DOI: 10.1088/1367-2630/17/9/093011 |
0.796 |
|
2015 |
Xu F, Curty M, Qi B, Qian L, Lo H. Discrete and continuous variables for measurement-device-independent quantum cryptography Nature Photonics. 9: 772-773. DOI: 10.1038/Nphoton.2015.206 |
0.822 |
|
2014 |
Curty M, Xu F, Cui W, Lim CC, Tamaki K, Lo HK. Finite-key analysis for measurement-device-independent quantum key distribution. Nature Communications. 5: 3732. PMID 24776959 DOI: 10.1038/Ncomms4732 |
0.86 |
|
2014 |
Abellán C, Amaya W, Jofre M, Curty M, Acín A, Capmany J, Pruneri V, Mitchell MW. Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode. Optics Express. 22: 1645-54. PMID 24515170 DOI: 10.1364/Oe.22.001645 |
0.385 |
|
2014 |
Liu Y, Cao Y, Curty M, Liao SK, Wang J, Cui K, Li YH, Lin ZH, Sun QC, Li DD, Zhang HF, Zhao Y, Chen TY, Peng CZ, Zhang Q, et al. Experimental unconditionally secure bit commitment. Physical Review Letters. 112: 010504. PMID 24483878 DOI: 10.1103/Physrevlett.112.010504 |
0.695 |
|
2014 |
Tamaki K, Curty M, Kato G, Lo H, Azuma K. Loss-tolerant quantum cryptography with imperfect sources Physical Review A. 90. DOI: 10.1103/Physreva.90.052314 |
0.856 |
|
2014 |
Lim CCW, Curty M, Walenta N, Xu F, Zbinden H. Concise security bounds for practical decoy-state quantum key distribution Physical Review A. 89. DOI: 10.1103/Physreva.89.022307 |
0.818 |
|
2014 |
Lo H, Curty M, Tamaki K. Secure quantum key distribution Nature Photonics. 8: 595-604. DOI: 10.1038/Nphoton.2014.149 |
0.856 |
|
2013 |
Xu F, Curty M, Qi B, Lo H. Practical aspects of measurement-device-independent quantum key distribution New Journal of Physics. 15: 113007. DOI: 10.1088/1367-2630/15/11/113007 |
0.856 |
|
2012 |
Moroder T, Curty M, Lim CC, Thinh le P, Zbinden H, Gisin N. Security of distributed-phase-reference quantum key distribution. Physical Review Letters. 109: 260501. PMID 23368542 DOI: 10.1103/Physrevlett.109.260501 |
0.662 |
|
2012 |
Lo HK, Curty M, Qi B. Measurement-device-independent quantum key distribution. Physical Review Letters. 108: 130503. PMID 22540686 DOI: 10.1103/Physrevlett.108.130503 |
0.829 |
|
2011 |
Jofre M, Curty M, Steinlechner F, Anzolin G, Torres JP, Mitchell MW, Pruneri V. True random numbers from amplified quantum vacuum. Optics Express. 19: 20665-72. PMID 21997077 DOI: 10.1364/Oe.19.020665 |
0.546 |
|
2011 |
Curty M, Ma X, Lo HK, Lütkenhaus N. Passive preparation of BB84 signal states with coherent light Progress in Informatics. 57-63. DOI: 10.2201/Niipi.2011.8.7 |
0.775 |
|
2011 |
Jofre M, Steinlechner F, Anzolin G, Torres JP, Mitchell MW, Pruneri V, Curty M. Compact optical sources for quantum communications Acm International Conference Proceeding Series. DOI: 10.1145/2093698.2093886 |
0.4 |
|
2011 |
Curty M, Moroder T. Heralded-qubit amplifiers for practical device-independent quantum key distribution Physical Review A. 84. DOI: 10.1103/Physreva.84.010304 |
0.694 |
|
2010 |
Curty M, Ma X, Lo HK, Lütkenhaus N. Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals Physical Review a - Atomic, Molecular, and Optical Physics. 82. DOI: 10.1103/Physreva.82.052325 |
0.834 |
|
2010 |
Wehner S, Curty M, Schaffner C, Lo HK. Implementation of two-party protocols in the noisy-storage model Physical Review a - Atomic, Molecular, and Optical Physics. 81. DOI: 10.1103/Physreva.81.052336 |
0.766 |
|
2010 |
Curty M, Ma X, Qi B, Moroder T. Passive decoy-state quantum key distribution with practical light sources Physical Review A. 81. DOI: 10.1103/Physreva.81.022310 |
0.789 |
|
2010 |
Curty M, Ma X, Qi B, Moroder T, Lütkenhaus N. Passive decoy state quantum key distribution with coherent light Optics Infobase Conference Papers. DOI: 10.1007/978-3-642-11731-2_17 |
0.809 |
|
2009 |
Curty M, Moroder T, Ma X, Lütkenhaus N. Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. Optics Letters. 34: 3238-40. PMID 19838285 DOI: 10.1364/Ol.34.003238 |
0.814 |
|
2009 |
Curty M, Moroder T, Ma X, Lo HK, Lütkenhaus N. Upper bounds for the secure key rate of the decoy-state quantum key distribution Physical Review a - Atomic, Molecular, and Optical Physics. 79. DOI: 10.1103/Physreva.79.032335 |
0.867 |
|
2009 |
Moroder T, Curty M, Lütkenhaus N. Detector decoy quantum key distribution New Journal of Physics. 11. DOI: 10.1088/1367-2630/11/4/045008 |
0.813 |
|
2008 |
Curty M, Tamaki K, Moroder T. Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks Physical Review A. 77. DOI: 10.1103/Physreva.77.052321 |
0.821 |
|
2008 |
Curty M, Lütkenhaus N. Comment on "arbitrated quantum-signature scheme" Physical Review a - Atomic, Molecular, and Optical Physics. 77. DOI: 10.1103/Physreva.77.046301 |
0.753 |
|
2007 |
Curty M, Moroder T. Single-photon quantum key distribution in the presence of loss Physical Review A. 75. DOI: 10.1103/Physreva.75.052336 |
0.668 |
|
2006 |
Moroder T, Curty M, Lütkenhaus N. One-way quantum key distribution: Simple upper bound on the secret key rate Physical Review a - Atomic, Molecular, and Optical Physics. 74. DOI: 10.1103/Physreva.74.052301 |
0.793 |
|
2006 |
Andersson E, Curty M, Jex I. Experimentally realizable quantum comparison of coherent states and its applications Physical Review A. 74. DOI: 10.1103/Physreva.74.022304 |
0.66 |
|
2006 |
Moroder T, Curty M, Lütkenhaus N. Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors Physical Review a - Atomic, Molecular, and Optical Physics. 73. DOI: 10.1103/Physreva.73.012311 |
0.752 |
|
2005 |
Curty M, Gühne O, Lewenstein M, Lütkenhaus N. Detecting quantum correlations for quantum key distribution Proceedings of Spie - the International Society For Optical Engineering. 5631: 9-19. DOI: 10.1117/12.575411 |
0.78 |
|
2005 |
Curty M, Lütkenhaus N. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key- distribution protocol with weak coherent pulses Physical Review a - Atomic, Molecular, and Optical Physics. 71. DOI: 10.1103/Physreva.71.062301 |
0.761 |
|
2005 |
Curty M, Gühne O, Lewenstein M, Lütkenhaus N. Detecting two-party quantum correlations in quantum-key-distribution protocols Physical Review a - Atomic, Molecular, and Optical Physics. 71. DOI: 10.1103/Physreva.71.022306 |
0.796 |
|
2005 |
Curty M, Gühne O, Lewenstein M, Lütkenhaus N. Quantum Correlations as Basic Resource for Quantum Key Distribution Quantum Information Processing: Second Edition. 44-57. DOI: 10.1002/3527606009.ch4 |
0.73 |
|
2004 |
Curty M, Lewenstein M, Lütkenhaus N. Entanglement as a precondition for secure quantum key distribution. Physical Review Letters. 92: 217903. PMID 15245320 DOI: 10.1103/Physrevlett.92.217903 |
0.801 |
|
2004 |
Eisert J, Hyllus P, Gühne O, Curty M. Complete hierarchies of efficient approximations to problems in entanglement theory Physical Review A. 70. DOI: 10.1103/Physreva.70.062317 |
0.438 |
|
2004 |
Curty M, Lütkenhaus N. Effect of finite detector efficiencies on the security evaluation of quantum key distribution Physical Review a - Atomic, Molecular, and Optical Physics. 69: 042321-1. DOI: 10.1103/Physreva.69.042321 |
0.781 |
|
2003 |
Pérez E, Curty M, Santos DJ, Garcìa-Fernández P. Quantum authentication with unitary coding sets Journal of Modern Optics. 50: 1035-1047. DOI: 10.1080/09500340308234550 |
0.608 |
|
2002 |
Curty M, Santos DJ, Pérez E, García-Fernández P. Qubit authentication Physical Review A. 66. DOI: 10.1103/PhysRevA.66.022301 |
0.57 |
|
2001 |
Curty M, Santos DJ. Quantum authentication of classical messages Physical Review A. 64. DOI: 10.1103/Physreva.64.062309 |
0.667 |
|
Show low-probability matches. |